Way2HelpS is a network of Computer Hardware and Networking's Professionals dedicated to helping you.
Way2HelpS is a fast growing blog that helps to buddies in many ways specially who is related to computer hardware and networking sector / field.
Here you get Dream Job, Practical path, Online exam papers and dumps for all the module for Jetking, HCL CDC, Data Expert, GT, IHT, IIHT, etc. as well as MCSE, RHCE and CCNA we will provide a lots of online practice test.

Q. NO. 5To identify the beginning of a chapter _________ options is used.

1 . Landmark

2 . Sigma

3 . Stopper

4 . Bookmark

2/4/15/19True Or FalseMarks = 1

Q. NO. 1XCopy command copies executable files only.

1 . TRUE

2 . FALSE

2/4/15/5True Or FalseMarks = 1

Q. NO. 2Diskcopy is an external command.

1 . TRUE

2 . FALSE

2/4/15/7True Or FalseMarks = 1

Q. NO. 3jetking@rediffmail.com is an e-mail i.d.

1 . TRUE

2 . FALSE

2/4/15/9True Or FalseMarks = 1

Q. NO. 4Pivot table is a feature of MS-Excel.

1 . TRUE

2 . FALSE

2/4/15/15True Or FalseMarks = 1

Q. NO. 5Full form of ALU is Addition Logic Units.

1 . TRUE

2 . FALSE

2/4/16/28Single ChoiceMarks = 1

Q. NO. 1A font is

1 . different size of characters.

2 . different Style of characters

3 . both

4 . none

2/4/16/27Single ChoiceMarks = 1

Q. NO. 2Mail merge is used

1 . to merge source document with data source.

2 . to mail the copies

3 . copies the files

4 . none.

2/4/16/15Single ChoiceMarks = 1

Q. NO. 3In MS-Word picture tool is found in:

1 . View

2 . Edit

3 . Insert

4 . None

2/4/16/5Single ChoiceMarks = 1

Q. NO. 4windows98 Bootable floppy is made up of :

1 . Config.sys, autoexec.bat ,Command.com

2 . Himem.sys, command.com, Config.sys

3 . Command.com, Msdos.sys, Io.sys

4 . Command.com,Io.sys,Autoexec.bat

2/4/16/22Single ChoiceMarks = 1

Q. NO. 5__________ contains a variety of useful clip-art.

1 . Clip art gallery

2 . Art gallery

3 . Photo gallery

4 . None

5/8/29/37Single ChoiceMarks = 1

Q. NO. 1There is enough in world for every man's need but not enough for

one man's greed. Your views about this:

1 . This is just philosophy

2 . This is a fact

3 . Both A and B

4 . None

5/8/29/22Single ChoiceMarks = 1

Q. NO. 2Jetking has a long history of:

1 . 10 years

2 . 20 years

3 . 30 years

4 . 55 years

5/8/29/16Single ChoiceMarks = 1

Q. NO. 3Which statement is not suitable for the process of communication?

1 . Define the mesage accurately

2 . Remember your last 5 days itinerary

3 . Use appropriate words/gestures to symbolize its meaning

4 . Consider reciever's background to concide meanings

5/8/29/6Single ChoiceMarks = 1

Q. NO. 4Which is the nearest word to "Consequences" ?

1 . Ignorance

2 . Immediate

3 . Penalty

4 . Conscience

5/8/29/5Single ChoiceMarks = 1

Q. NO. 5What is time management?

1 . Counting of hours

2 . Not Pioritizing time

3 . Study of time

4 . Life Management

5/8/29/3Single ChoiceMarks = 1

Q. NO. 6What is non-verbal communication?

1 . No Hand gestures

2 . Giving instructions

3 . Facial expressions

4 . None

5/8/29/13Single ChoiceMarks = 1

Q. NO. 7What certificates are provided from Novell company?

1 . RHCE

2 . CCNA

3 . CNE

4 . MCSE

5/8/29/39Single ChoiceMarks = 1

Q. NO. 8Atul narrate a story to Mr. Vinod , and vinod narrates the same

story to Tapesh. After the story there is conflicts between Atul and

Tapesh the reason for the conflicts:

1 . Communication gap

2 . Lack of effective communication

3 . When story narrated by Vinod and Tapesh, the actual message was

modified.

4 . All are right.

5/8/29/47Single ChoiceMarks = 1

Q. NO. 9Physiological barrier means:

1 . Stammering problem

2 . Noise pollution

3 . Listening Problem

4 . Both 1 and 3

5/8/29/42Single ChoiceMarks = 1

Q. NO. 10Purity means

1 . removal of negative thoughts

2 . Cleanliness

3 . Not dirty

4 . None

Jetking Online Dumps for Module-2

For More Questions Contact Us.

Exam paper module 2

Multiple Choice Marks = 1Q.
NO. 1 You have noticed on your network that users are having difficulty
accessing Web pages. The pages seem to time out and fail. Which three
of the following tools in Windows XP Professional can help you diagnose
your problem?1 . ping2 . ipconfig3 . hostname4 . arp5 . nslookup

37/61/200/2 Multiple Choice Marks = 1Q.
NO. 3 TCP/IP is installed on each PC within a network. You can
communicate within the network but are unable to access the Internet.
Which of the following TCP/IP settings must be properly configured for
Internet access?1 . IP Address2 . MAC address3 . Default Gateway4 . DNS Server5 . SubNet Mask

37/61/200/9 Multiple Choice Marks = 1Q. NO. 5 Which of the following are the features of the NTFS file system? (Choose all that apply)1 . Encryption2 . Disk Quota3 . NTFS Compression4 . NTFS Permission for Local Security5 . None of the Above

37/61/200/7 Multiple Choice Marks = 1Q. NO. 6 In which of the Windows Vista edition, Parental Control is not available? (Choose all that apply)1 . Home Basic2 . Home Premium3 . Business4 . Ultimate5 . Enterprise

37/61/200/6 Multiple Choice Marks = 1Q. NO. 8 Which three of the following are advantages of the NTFS file system over the FAT or FAT32 systems?1 . The NTFS file system is more reliable.2 . The NTFS file system is better for dual-booting.3 . The NTFS file system provides greater security.4 . The NTFS file system stores files more efficiently.5 . The NTFS file system is supported by all legacy versions of Windows.

37/61/202/5 Single Choice Marks = 1Q. NO. 4 The user with _____________rights can set or change a password of other users.1 . Guest2 . Administrative3 . Standard4 . Advanced5 . None of Above

37/61/202/10 Single Choice Marks = 1Q. NO. 5 ________enables you to use previous version of driver when the driver you are using causes system instability.1 . Plug and Play2 . Device Manager3 . Driver4 . Driver Rollback5 . None of Above

37/62/204/19 Multiple Choice Marks = 1Q. NO. 4 Some one placed a BIOS password on a computer and forgot the password. What should you do? (Choose two)1 . Boot to a floppy and fdisk the drive.2 . Temporarily remove the CMOS battery.3 . Go into BIOS setup and delete the password.4 . Clear the CMOS by shortening the CMOS jumper.5 . Boot down the computer while holding down the key.

37/62/204/11 Multiple Choice Marks = 1Q. NO. 15 Which events increase the chances of a motherboard failure? (Choose two)1 . Power being lost while updating the BIOS.2 . Power being lost while updating the printer.3 . Connecting a USB device with the power on.4 . Connecting a PS/2 mouse with the power on.5 . Connecting a serial mouse with the power on.PART OVER37/62/205/18 Single Choice Marks = 1Q. NO. 1 The ___________ bus standard introduces by IBM is not used presently.1 . PCI2 . MCA3 . VESA4 . ISA5 . None of above

Answer
With Explanation= "A directory service allows businesses to define,
manage, access, and secure network resources including files, printers,
people, and applications. Without the efficiency of a directory service,
businesses would have difficulty keeping up with demands for fast-paced
data exchange.";

Case 2 : = "A __________ is defined as one or more IP subnets that are connected by fast links.";

optinon no. 1= "domain";

Optinon No. 2= "network";

Optinon No. 3= "site";

Optinon No. 4= "forest";

Correct Answer= "C";

Answer
With Explanation= "A site is defined as one or more IP subnets that are
connected by fast links. In most circumstances, all computers that are
connected via a single LAN will constitute a single site. Within Active
Directory, sites are used to optimize the replication of Active
Directory information across small or large geographic areas.";

Case 3 :

=
"What contains the rules and definitions that are used for creating and
modifying object classes and attributes within Active Directory?";

optinon no. 1= "Configuration NC";

Optinon No. 2= "Schema NC";

Optinon No. 3= "Domain NC";

Optinon No. 4= "DC NC";

Correct Answer= "B";

Answer
With Explanation= "The schema partition, or Schema NC, contains the
rules and definitions that are used for creating and modifying object
classes and attributes within Active Directory.";

Case 4 :

=
"What shared folder exists on all domain controllers and is used to
store Group Policy objects, login scripts, and other files that are
replicated domain-wide?";

optinon no. 1= "SYSVOL";

Optinon No. 2= "AD";

Optinon No. 3= "C$";

Optinon No. 4= "VOLMGR";

Correct Answer= "A";

Answer
With Explanation= "The SYSVOL shared folder exists on all domain
controllers and is used to store Group Policy Objects, login scripts,
and other files that are replicated domain-wide.";

Case 5 :

=
"What new Windows Server 2008 feature is a special installation option
that creates a minimal environment for running only specific services
and roles?";

optinon no. 1= "Minimal Installation Option";

Optinon No. 2= "Server Core";

Optinon No. 3= "Server Standard";

Optinon No. 4= "Minimal Server Environment (MSE)";

Correct Answer= "B";

Answer
With Explanation= "One of the key new features of Windows Server 2008
is Server Core, a special installation option that creates a minimal
environment for running only specific services and roles. Server Core
runs almost entirely without a graphical user interface (GUI), which
means that it needs to be administered exclusively from the command
line.";

Case 6 :

= "What is the minimum amount of storage space required for the Active Directory installation files?";

= "When modifying the schema, Microsoft recommends adding administrators to what group only for the duration of the task?";

optinon no. 1= "Schema Admins";

Optinon No. 2= "Enterprise Admins";

Optinon No. 3= "Global Admins";

Optinon No. 4= "Forest Admins";

Correct Answer= "A";

Answer
With Explanation= "Microsoft recommends adding administrators to the
Schema Admins group only for the duration of the administrative task at
hand.";

Case 8 :

=
"When you install the forest root domain controller in an Active
Directory forest, the Active Directory Installation Wizard creates a
single site named __________.";

optinon no. 1= "Default-Site";

Optinon No. 2= "Site-Default";

Optinon No. 3= "Default-Site-Name";

Optinon No. 4= "Default-First-Site-Name";

Correct Answer= "D";

Answer
With Explanation= "When you install the forest root domain controller
in an Active Directory forest, the Active Directory Installation Wizard
creates a single site called Default-First-Site-Name, which you can see
in the Active Directory Sites and Services tool.";

Answer
With Explanation= "Dcdiag is a command-line tool used for monitoring
Active Directory. When run from a command prompt, this tool can perform
connectivity and replication tests, report errors that occur, report DNS
registration problems, analyze the permissions required for
replication, and analyze the state of domain controllers within the
forest.";

Case 10 :

=
"When replicating information between sites, Active Directory will
designate a __________ server in each site to act as a gatekeeper in
managing site-to-site replication.";

optinon no. 1= "primary";

Optinon No. 2= "masthead";

Optinon No. 3= "bridgehead";

Optinon No. 4= "global catalog";

Correct Answer= "C";

Answer
With Explanation= "When replicating information between sites, Active
Directory will designate a bridgehead server in each site to act as a
gatekeeper in managing site-to-site replication. This allows intersite
replication to update only one domain controller within a site.";

Case 11 :

= "What defines a chain of site links by which domain controllers from different sites can communicate?";

optinon no. 1= "site link bridge";

Optinon No. 2= "site chain";

Optinon No. 3= "site chain bridge";

Optinon No. 4= "site link chain";

Correct Answer= "A";

Answer
With Explanation= "A site link bridge defines a chain of site links by
which domain controllers from different sites can communicate. In Cases
in which there is a centralized site that connects two branch sites via
site links, the site link bridge creates a direct link between the
branch sites using the total cost of both site links to the central
site.";

Case 12 :

= "How many FSMO roles does Active Directory support?";

optinon no. 1= "2";

Optinon No. 2= "5";

Optinon No. 3= "10";

Optinon No. 4= "12";

Correct Answer= "B";

Answer
With Explanation= "Active Directory supports five FSMO roles. Their
functionality is divided between domain-wide and forest-wide FSMOs.";

Case 13 :

= "How many RID Masters can a domain have?";

optinon no. 1= "1";

Optinon No. 2= "2";

Optinon No. 3= "3";

Optinon No. 4= "5";

Correct Answer= "A";

Answer With Explanation= "Each domain can have only one RID Master.";

Case 14 :

=
"What procedure is used only when you have experienced a catastrophic
failure of a domain controller that holds a FSMO role and you need to
recover that role?";

optinon no. 1= "role transfer";

Optinon No. 2= "role migration";

Optinon No. 3= "role seizure";

Optinon No. 4= "role separation";

Correct Answer= "C";

Answer
With Explanation= "The role seizure procedure is used only when you
have experienced a catastrophic failure of a domain controller that
holds a FSMO role. Seizing a role can be defined as a forced, permanent
transfer.";

Case 15 :

= "What special identity group contains all authenticated users and domain guests?";

optinon no. 1= "Power Users";

Optinon No. 2= "Everyone";

Optinon No. 3= "Batch";

Optinon No. 4= "Authenticated Users";

Correct Answer= "B";

Answer
With Explanation= "Windows Server 2008 uses special identity groups to
represent a class of users or the system itself. The Everyone group is a
special identity group that contains all authenticated users and domain
guests.";

Case 16 :

= "__________ name refers to each user’s login name.";

optinon no. 1= "Common";

Optinon No. 2= "Distinguished";

Optinon No. 3= "SAM account";

Optinon No. 4= "AD Name";

Correct Answer= "C";

Answer
With Explanation= "The SAM account name refers to each user’s login
name—the portion to the left of the ‘@’ within a User Principal Name.";

Case 17 :

= "You cannot manually modify the group membership of or view the membership lists of __________ groups.";

optinon no. 1= "distribution";

Optinon No. 2= "domain local";

Optinon No. 3= "special identity";

Optinon No. 4= "universal";

Correct Answer= "C";

Answer
With Explanation= "You cannot manually modify the group membership of
special identity groups, nor can you view their membership lists.";

Case 18 :

= "What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?";

optinon no. 1= "DCPROMO";

Optinon No. 2= "LDIFDE";

Optinon No. 3= "CSVDE";

Optinon No. 4= "NSLOOKUP";

Correct Answer= "B";

Answer
With Explanation= "Like CSVDE, the LDAP Data Interchange Format
Directory Exchange (LDIFDE) utility can be used to import or export
Active Directory information. It can be used to add, delete, or modify
objects in Active Directory, in addition to modifying the schema, if
necessary. It also can be used to import data from other directory
services, such as Novell NetWare.";

Case 19 :

= "Which of the following is a benefit of implementing a public key infrastructure (PKI)?";

optinon no. 1= "Users no longer need to remember passwords.";

Optinon
No. 2= "All information is stored on the smart card, making it
difficult for anyone except the intended user to use or access it.";

Optinon No. 3= "Smart cards can be used from remote locations, such as a home office, to provide authentication services.";

Optinon No. 4= "All of the above";

Correct Answer= "D";

Answer
With Explanation= "The benefits of implementing a PKI include: users no
longer need to remember passwords; all information is stored on the
smart card, making it difficult for anyone except the intended user to
use or access it; security operations, such as cryptographic functions,
are performed on the smart card itself rather than on the network server
or local computer; smart cards can be used from remote locations, such
as a home office, to provide authentication services; and the risk of
remote attacks using a username and password is significantly reduced by
smart cards.";

Case 20 :

= "What method of authentication requires a smart card and a PIN to provide more secure access to company resources?";

optinon no. 1= "two-factor authentication";

Optinon No. 2= "dual authentication";

Optinon No. 3= "complex authentication";

Optinon No. 4= "strong authentication";

Correct Answer= "A";

Answer
With Explanation= "A smart card is a credit cardsized device or a
token-style device, such as a USB device, that is used with a PIN to
enable logon to the enterprise. This two-factor authentication method
requires a smart card and a PIN to provide more secure access to company
resources. It has been implemented by many high-security
organizations.";

Case 21 :

=
"What dedicated workstation allows an administrator or another
authorized user to preconfigure certificates and smart cards on behalf
of a user or workstation?";

optinon no. 1= "PKI server";

Optinon No. 2= "smart card enrollment station";

Optinon No. 3= "smart card verification station";

Optinon No. 4= "Certification Authority (CA)";

Correct Answer= "B";

Answer
With Explanation= "Prior to deploying smart cards, you must set up at
least one computer as a smart card enrollment station, which is a
dedicated workstation that allows an administrator or another authorized
user to preconfigure certificates and smart cards on behalf of a user
or workstation.";

Answer
With Explanation= "Group Policy is a method of controlling settings
across your network. Group Policy consists of user and computer settings
on the Windows Server 2008, Windows Server 2003 family, Microsoft
Windows 2000 family, Window Vista, and Microsoft Windows XP Professional
platforms that can be implemented during computer startup and shutdown
and user logon and logoff.";

Case 24 :

=
"What contains all of the Group Policy settings that you wish to
implement to user and computer objects within a site, domain, or OU?";

optinon no. 1= "Group Policies";

Optinon No. 2= "Group Policy Settings";

Optinon No. 3= "Group Policy Objects";

Optinon No. 4= "Group Policy Links";

Correct Answer= "C";

Answer
With Explanation= "Group Policy Objects (GPOs) contain all of the Group
Policy settings that you wish to implement to user and computer objects
within a site, domain, or OU. The GPO must be associated with the
container to which it is applied.";

Case 25 :

=
"What allows the Group Policy processing order to circle back and
reapply the computer policies after all user policies and logon scripts
run?";

optinon no. 1= "Reverse Processing";

Optinon No. 2= "Switchback Processing";

Optinon No. 3= "Loopback Processing";

Optinon No. 4= "Repeat Processing";

Correct Answer= "C";

Answer
With Explanation= "Loopback processing is a Group Policy option that
provides an alternative method of obtaining the ordered list of GPOs to
be processed for the user. When set to Enabled, this setting has two
options: Merge and Replace.";

Case 26 :

= "Local GPO settings are stored in what folder on a computer?";

optinon no. 1= "%systemroot%/System32/GroupPolicy";

Optinon No. 2= "%systemroot%/System32/Drivers/GroupPolicy";

Optinon No. 3= "%systemroot%/System32/Drivers/Etc/GroupPolicy";

Optinon No. 4= "%systemroot%/System/GroupPolicy";

Correct Answer= "A";

Answer
With Explanation= "Each computer running Windows Server 2008, Windows
Server 2003, Windows XP Professional, or Windows 2000 has only one local
GPO, and the settings in that local GPO will apply to all users who log
on to the computer. The local GPO settings are stored on the local
computer in the %systemroot%/System32/GroupPolicy folder.";

Case 27 :

=
"What policies can be applied to one or more users or groups of users,
allowing you to specify a more or less stringent password policy for
this subset than the password policy defined for the entire domain?";

optinon no. 1= "Fine-Grained Password Policies";

Optinon No. 2= "Fine-Tuned Password Policies";

Optinon No. 3= "Restricted Password Policies";

Optinon No. 4= "Custom Password Policies";

Correct Answer= "A";

Answer
With Explanation= "Fine-Grained Password Policies can be applied to one
or more users or groups of users, allowing you to specify a more or
less stringent password policy for this subset than the password policy
defined for the entire domain.";

Answer
With Explanation= "The setting for the refresh interval for computers
is located in the Computer Configuration\\Administrative
Templates\\System\\Group Policy node in the Group Policy Object Editor
window for a GPO.";

Case 29 :

=
"Microsoft Windows Server 2008 uses the Windows Installer with Group
Policy to install and manage software that is packaged into what type of
file?";

optinon no. 1= ".exe";

Optinon No. 2= ".msi";

Optinon No. 3= ".mse";

Optinon No. 4= ".inf";

Correct Answer= "B";

Answer
With Explanation= "Microsoft Windows Server 2008 uses the Windows
Installer with Group Policy to install and manage software that is
packaged into an .msi file. An .msi file is a relational database file
that is copied to the target computer system with the program files it
deploys.";

Case 30 :

= "Modifications to .msi files require transform files, which have the __________ extension.";

optinon no. 1= ".msit";

Optinon No. 2= ".mse";

Optinon No. 3= ".msx";

Optinon No. 4= ".mst";

Correct Answer= "D";

Answer
With Explanation= "At times, you may need to modify Windows Installer
files to better suit the needs of your corporate network. Modifications
to .msi files require transform files, which have an .mst extension.";

Case 31 :

=
"When configuring Software Restriction policies, which option prevents
any application from running that requires administrative rights, but
allows programs to run that only require resources that are accessible
by normal users?";

optinon no. 1= "Unrestricted";

Optinon No. 2= "Restricted";

Optinon No. 3= "Basic User";

Optinon No. 4= "Disallowed";

Correct Answer= "C";

Answer
With Explanation= "The Basic User software restriction policy prevents
any application from running that requires administrative rights, but
allows programs to run that only require resources that are accessible
by normal users.";

Answer
With Explanation= "The Delegation tab displays groups and users with
permission to link, perform modeling analyses, or read group policy
results information. Modeling is the same as Planning mode using RsoP.";

Case 33 :

=
"What setting will prevent policy settings from applying to all child
objects at the current level and all subordinate levels?";

optinon no. 1= "Block Policy Propagation";

Optinon No. 2= "Block Policy Inheritance";

Optinon No. 3= "Remove Policy Inheritance";

Optinon No. 4= "Remove Policy Propagation";

Correct Answer= "B";

Answer
With Explanation= "Using the Block Policy Inheritance policy setting,
you can prevent policy settings from applying to all child objects at
the current level and all subordinate levels. Although the Block Policy
Inheritance setting is useful in some circumstances, it may be necessary
to have a policy apply only when certain conditions exist or only to a
certain group of people.";

Case 34 :

= "How many WMI filters can be configured per GPO?";

optinon no. 1= "one";

Optinon No. 2= "two";

Optinon No. 3= "three";

Optinon No. 4= "five";

Correct Answer= "A";

Answer
With Explanation= "Only one WMI filter can be configured per GPO. After
it is created, a WMI filter can be linked to multiple GPOs.";

Case 35 :

= "To perform a System State restore in Windows Server 2008, you will boot the DC into what mode?";

optinon no. 1= "Active Directory Restore";

Optinon No. 2= "Active Directory Maintenance";

Optinon No. 3= "Directory Services Maintenance";

Optinon No. 4= "Directory Services Restore";

Correct Answer= "D";

Answer
With Explanation= "To perform a System State restore in Windows Server
2008, you will boot the DC into Directory Services Restore Mode and then
use the wbadmin command-line utility.";

Case 36 :

= "In Windows Server 2008, you must back up __________ rather than only backing up the System State data.";

optinon no. 1= "critical volumes";

Optinon No. 2= "system volumes";

Optinon No. 3= "MBR records";

Optinon No. 4= "MX records";

Correct Answer= "A";

Answer
With Explanation= "Windows Server 2008 does not back up or recover
System State data in the same way as servers that run Windows Server
2003 or Windows Server 2000. In Windows Server 2008, you must back up
critical volumes rather than only backing up the System State data.";

Case 37 :

= "To back up Active Directory, you must install what feature from the Server Manager console?";

optinon no. 1= "Active Directory Backup Client";

Optinon No. 2= "Windows Backup Utility";

Optinon No. 3= "Windows Server Backup";

Optinon No. 4= "BackupExec";

Correct Answer= "C";

Answer With Explanation= "the Server Manager console.";

Case 38 :

= "What is the process by which one DNS server sends a name resolution request to another DNS server?";

optinon no. 1= "resolution";

Optinon No. 2= "translation";

Optinon No. 3= "referral";

Optinon No. 4= "propagation";

Correct Answer= "C";

Answer
With Explanation= "The process by which one DNS server sends a name
resolution request to another DNS server is called a referral. Referrals
are essential to the DNS name resolution process.";

Case 39 :

= "What DNS server contains no zones and hosts no domains?";

optinon no. 1= "secondary domain controller";

Optinon No. 2= "global catalog server";

Optinon No. 3= "secondary DNS server";

Optinon No. 4= "caching-only server";

Correct Answer= "D";

Answer
With Explanation= "A DNS server that contains no zones and hosts no
domains is called a caching-only server. If you have Internet clients on
your network but do not have a registered domain name and are not using
Active Directory, you can deploy caching-only servers that provide
Internet name resolution services for your clients.";

Case 40 :

= "What Windows Server 2008 service can you use to protect sensitive data on a Windows network?";

optinon no. 1= "AD FS";

Optinon No. 2= "AD FTP";

Optinon No. 3= "AD FSMO";

Optinon No. 4= "AD RMS";

Correct Answer= "D";

Answer
With Explanation= "Active Directory Rights Management Service (AD RMS)
is a Windows Server 2008 service that you can use to protect sensitive
data on a Windows network. In particular, it enables owners of data
stored within RMS-capable applications (such as word processing or
spreadsheet applications) to control who can open, modify, or print a
document and even who can print or forward confidential email
messages.";

Case 41 :

=
"What enables network administrators and owners to configure access
rights for users during the users’ entire lifecycle within an
organization?";

optinon no. 1= "Identity Lifecycle Management";

Optinon No. 2= "General Lifecycle Management";

Optinon No. 3= "Microsoft Lifecycle Management";

Optinon No. 4= "Lifecycle of Software Management";

Correct Answer= "A";

Answer
With Explanation= "Identity Lifecycle Management (ILM) enables network
administrators and owners to configure access rights for users during
the user’s entire life cycle within an organization. This includes
providing a user account, modifying access rights as a user’s role
changes within an organization, and finally deprovisioning a user
account when the user’s relationship with an organization is ended.";

Case 42 :

=
"What are small physical devices on which a digital certificate is
installed that are usually the size of a credit card or keychain fob?";

optinon no. 1= "RSA SecureID";

Optinon No. 2= "digital certificates";

Optinon No. 3= "smart cards";

Optinon No. 4= "biometric device";

Correct Answer= "C";

Answer
With Explanation= "Smart cards are small physical devices, usually the
size of a credit card or keychain fob, that have a digital certificate
installed on them. By using a smart card reader (a physical device
attached to a workstation), users can use a smart card to authenticate
to an Active Directory domain, access a Website, or authenticate to
other secured resources, typically by entering a numeric personal
identification number (PIN) instead of a password.";

Case 43 :

=
"What service responds to requests from clients concerning the
revocation status of a particular certificate, returning a digitally
signed response indicating the certificate’s current status?";

optinon no. 1= "Web Enrollment";

Optinon No. 2= "Web Responder";

Optinon No. 3= "enterprise CA";

Optinon No. 4= "Online Responder";

Correct Answer= "D";

Answer
With Explanation= "The Online Responder service responds to requests
from clients concerning the revocation status of a particular
certificate, returning a digitally signed response indicating the
certificate’s current status.";

Part- B

Question No. 1 :

"A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a __________.";

Option No.- 1= "domain controller";

Option No.- 2= "domain manager";

Option No.- 3= "global catalog";

Option No.- 4= "DNS server";

Correct Option is= "A";

Explanation
of Answer= "A Windows Server 2008 computer that has been configured
with the Active Directory DS role is referred to as a domain controller
(DC). A domain controller is a server that stores the Active Directory
database and authenticates users with the network during logon.";

Question No. 2 :

"What protocol has become an industry standard that enables data exchange between directory services and applications?";

Option No.- 1= "NTDS";

Option No.- 2= "LDAP";

Option No.- 3= "NDIS";

Option No.- 4= "AD";

Correct Option is= "B";

Explanation
of Answer= "Active Directory’s scalability and integration capabilities
result from its use of industry standards for naming formats and
directory functions, specifically the Lightweight Directory Access
Protocol (LDAP). Since the introduction of LDAP, this protocol has
become an industry standard that enables data exchange between directory
services and applications.";

Explanation
of Answer= "Cross-forest trust relationships were introduced in Windows
Server 2003; they allow you to create two-way transitive trusts between
separate forests.";

Question No. 6 :

"What type of zone is necessary for computer hostname-to-IP address
mappings, which are used for name resolution by a variety of services?";

Option No.- 1= "primary lookup";

Option No.- 2= "secondary lookup";

Option No.- 3= "forward lookup";

Option No.- 4= "reverse lookup";

Correct Option is= "C";

Explanation
of Answer= "Forward lookup zones are necessary for computer
hostname–to–IP address mappings, which are used for name resolution by a
variety of services. For example, when a user requests access to a
server based on its hostname, the request is passed to a DNS server to
resolve the hostname to an IP address. Most queries are based on forward
lookups.";

Question No. 7 :

"What DLL must be registered to use the Schema Management snap-in?";

Option No.- 1= "schmmgnt32.dll";

Option No.- 2= "schemamanagement.dll";

Option No.- 3= "schmmgmt.dll";

Option No.- 4= "adschm.dll";

Correct Option is= "C";

Explanation
of Answer= "The schmmgmt.dll DLL is not registered by default in
Windows Server 2008 and needs to be added manually to run the Schema
Management MMC snap-in.";

Question No. 8 :

"Replication within Active Directory will occur when which of the following conditions is met?";

Explanation
of Answer= "Replication within Active Directory will occur when an
object is added or removed from Active Directory, the value of an
attribute has changed, or the name of an object has changed.";

Question No. 9 :

"What command-line tool can be used to manually create a replication
topology if site link bridging is disabled if the network is not fully
routed?";

Option No.- 1= "Dcdiag";

Option No.- 2= "Repdiag";

Option No.- 3= "Repadmin";

Option No.- 4= "Netstat";

Correct Option is= "C";

Explanation
of Answer= "Repadmin is a command-line tool used to manually create a
replication topology if site link bridging is disabled if the network is
not fully routed.";

Question No. 10 :

"Certain operations, such as a password change or an account lockout,
will be transmitted by using __________ replication, which means that
the change will be placed at the “beginning of the line” and applied
before any other changes that are waiting to be replicated.";

Option No.- 1= "urgent";

Option No.- 2= "immediate";

Option No.- 3= "fast";

Option No.- 4= "pushed";

Correct Option is= "A";

Explanation
of Answer= "Certain operations, such as a password change or an account
lockout, will be transmitted using urgent replication, which means that
the change will be placed at the “beginning of the line” and will be
applied before any other changes that are waiting to be replicated.";

Question No. 11 :

"Which FSMO role has the authority to manage the creation and deletion
of domains, domain trees, and application data partitions in the
forest?";

Option No.- 1= "Relative Identifier Master";

Option No.- 2= "Infrastructure Master";

Option No.- 3= "Domain Naming Master";

Option No.- 4= "Schema Master";

Correct Option is= "C";

Explanation
of Answer= "The Domain Naming Master role has the authority to manage
the creation and deletion of domains, domain trees, and application data
partitions in the forest. When any of these is created, the Domain
Naming Master ensures that the name assigned is unique to the forest.";

Question No. 12 :

"What types of memberships are stored in the global catalog?";

Option No.- 1= "domain local";

Option No.- 2= "universal";

Option No.- 3= "global";

Option No.- 4= "local workstation";

Correct Option is= "B";

Explanation
of Answer= "Domain local and global group memberships are stored at the
domain level; universal group memberships are stored in the global
catalog.";

Question No. 13 :

"What console must be used to move the Domain Naming Master FSMO role?";

Option No.- 1= "Active Directory Users and Computers";

Option No.- 2= "Active Directory Forests and Domains";

Option No.- 3= "Active Directory Schema";

Option No.- 4= "Active Directory Domains and Trusts";

Correct Option is= "D";

Explanation
of Answer= "The Active Directory Domains and Trusts console must be
used to move the Domain Naming Master FSMO role.";

Question No. 14 :

"What command-line utility is used to import or export Active Directory
information from a comma-separated value (.csv) file?";

Option No.- 1= "NETDIAG";

Option No.- 2= "NSLOOKUP";

Option No.- 3= "CSVDE";

Option No.- 4= "DCPROMO";

Correct Option is= "C";

Explanation
of Answer= "The Comma-Separated Value Directory Exchange (CSVDE)
command-line utility is used to import or export Active Directory
information from a comma-separated value (.csv) file. These files can be
created in any text editor. This command-line utility only imports or
exports new objects; it cannot modify or delete existing objects.";

Question No. 15 :

"What special identity group is used by the system to allow permission
to protected system files for services to function properly?";

Option No.- 1= "Network Service";

Option No.- 2= "Restricted";

Option No.- 3= "Service";

Option No.- 4= "Self";

Correct Option is= "C";

Explanation
of Answer= "The service special identity group is used by the system to
allow permission to protected system files for services to function
properly. It includes all security principals: users, groups, or
computers that are currently logged on as a service.";

Question No. 16 :

"When using CSVDE, what is the first line of the text file that uses proper attribute names?";

Option No.- 1= "header row";

Option No.- 2= "header record";

Option No.- 3= "name row";

Option No.- 4= "name record";

Correct Option is= "B";

Explanation
of Answer= "The CSVDE command-line utility allows an administrator to
import or export Active Directory objects. It uses a .csv file that is
based on a header record, which describes each part of the data. A
header record is simply the first line of the text file that uses proper
attribute names.";

Question No. 17 :

"Which of the following is not a characteristic of a strong password?";

Option No.- 1= "at least eight characters in length";

Option No.- 2= "at least one character from each of the previous character types";

Option No.- 3= "is not your birth date";

Option No.- 4= "differs significantly from other previously used passwords";

Correct Option is= "C";

Explanation
of Answer= "A strong password has the following characteristics: at
least eight characters in length; contains upperQuestion No. and
lowerQuestion No. letters, numbers, and nonalphabetic characters; at
least one character from each of the previous character types; and
differs significantly from other previously used passwords.";

Question No. 18 :

"What is a system of digital certificates, certification authorities
(CAs), and other registration authorities (RAs) that verify and
authenticate the validity of each party involved in an electronic
transaction through the use of public key cryptography?";

Option No.- 1= "CKI";

Option No.- 2= "PKI";

Option No.- 3= "DKI";

Option No.- 4= "PCI";

Correct Option is= "B";

Explanation
of Answer= "Smart cards contain a chip that stores user information
such as the user’s private key for certificate-related services; user
credentials, such as the username; and a public key certificate. This
requires the implementation of a public key infrastructure (PKI). PKI is
a system of digital certificates, certification authorities (CAs), and
other registration authorities (RAs) that verify and authenticate the
validity of each party involved in an electronic transaction through the
use of public key cryptography.";

Question No. 19 :

"What types of certificates are generated by the enterprise CA and used
to generate a smart card logon certificate for users in the
organization?";

Option No.- 1= "enrollment agent";

Option No.- 2= "enrollment credential";

Option No.- 3= "enrollment verification";

Option No.- 4= "enrollment authority";

Correct Option is= "A";

Explanation
of Answer= "Enrollment agent certificates are generated by the
enterprise CA and are used to generate a smart card logon certificate
for users in the organization. Because these enrollment agent
certificates can generate smart cards with authentication credentials
for anyone in the organization, you should make sure strong security
policies are in place for issuing enrollment agent certificates.";

Question No. 20 :

"What process applies Group Policy settings to various containers within Active Directory?";

Option No.- 1= "attaching";

Option No.- 2= "linking";

Option No.- 3= "connecting";

Option No.- 4= "nesting";

Correct Option is= "B";

Explanation
of Answer= "You can configure one or more GPOs within a domain and then
use a process called linking, which applies these settings to various
containers within Active Directory. You can link multiple GPOs to a
single container or link one GPO to multiple containers throughout the
Active Directory structure.";

Question No. 21 :

"The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.";

Option No.- 1= "Default Domain Controller";

Option No.- 2= "Default Domain";

Option No.- 3= "Default";

Option No.- 4= "Domain";

Correct Option is= "B";

Explanation
of Answer= "The Default Domain Policy is linked to the domain, and its
settings affect all users and computers in the domain.";

Question No. 22 :

"What policies work with folder redirection to provide the ability to cache files locally?";

Option No.- 1= "registry-based";

Option No.- 2= "software installation";

Option No.- 3= "folder redirection";

Option No.- 4= "offline file storage";

Correct Option is= "D";

Explanation
of Answer= "Offline file storage works with folder redirection to
provide the ability to cache files locally. This allows files to be
available even when the network is inaccessible.";

Explanation
of Answer= "The Group Policy templates (GPT) folder structure is
located in the shared SYSVOL folder on a domain controller. The path to
the default GPT structure for thecohowinery.comdomain is %systemroot%\\sysvol\\sysvol\\cohowinery.com\\Policies\\. Replace %systemroot% with the folder location for the operating system files.";

Explanation
of Answer= "The Audit Policy section of GPO Local Policies allows
administrators to log successful and failed security events such as
logon events, account access, and object access. Auditing can be used to
track user activities and system activities.";

Question No. 25 :

"What provides administrators with the ability to redirect the contents
of certain folders to a network location or to another location on the
user’s local computer?";

Option No.- 1= "Folder Sharing";

Option No.- 2= "Folder Redirection";

Option No.- 3= "Desktop Redirection";

Option No.- 4= "Profile Redirection";

Correct Option is= "B";

Explanation
of Answer= "Folder Redirection is a Group Policy folder located within
the User Configuration node of a Group Policy linked to an Active
Directory container object. Folder redirection provides administrators
with the ability to redirect the contents of certain folders to a
network location or to another location on the user’s local computer.
Contents of folders on a local computer located in the Documents and
Settings folder can be redirected including the Documents, Application
Data, Desktop, and Start Menu folders.";

Question No. 26 :

"Settings available in the __________ area of Group Policy allow
greater administrative control in establishing rules and governing the
issuance, maintenance, and guidelines within a public key infrastructure
(PKI).";

Option No.- 1= "PKI Policies";

Option No.- 2= "Secure Key Policies";

Option No.- 3= "Public Key Policies";

Option No.- 4= "Private Key Policies";

Correct Option is= "C";

Explanation
of Answer= "The settings available in the Public Key Policies area of
Group Policy allow greater administrative control in establishing rules
and governing the issuance, maintenance, and guidelines within a public
key infrastructure (PKI). Group Policy is not required to create a PKI,
but like other Group Policy settings, the benefit lies in the ability to
automate processes, provide consistency, and ease management across
your network.";

Question No. 27 :

"__________ files are used to apply service packs and hotfixes to installed software.";

Option No.- 1= "Update";

Option No.- 2= "Patch";

Option No.- 3= "Upgrade";

Option No.- 4= "Enhanced";

Correct Option is= "B";

Explanation
of Answer= "Windows Installer files with the .msp extension serve as
patch files. Patch files are used to apply service packs and hotfixes to
installed software. Unlike an .msi file, a patch package does not
include a complete database. Instead, it contains, at minimum, a
database transform procedure that adds patching information to the
target installation package database.";

Question No. 28 :

"Which of the following is a software restriction rule that can be used
to govern which programs can or cannot run on your network?";

Option No.- 1= "hash rule";

Option No.- 2= "certificate rule";

Option No.- 3= "Path rule";

Option No.- 4= "all of the above";

Correct Option is= "D";

Explanation
of Answer= "Four types of software restriction rules can be used to
govern which programs can or cannot run on your network. These are hash
rules, certificate rules, path rules, and network zone rules.";

Question No. 29 :

"What policies are designed to identify software and control its execution?";

Option No.- 1= "Software Restriction";

Option No.- 2= "Software Execution Prevention";

Option No.- 3= "Malicious Software Detection";

Option No.- 4= "Malicious Software Removal Policies";

Correct Option is= "A";

Explanation
of Answer= "First introduced in Windows Server 2003 and Windows XP
operating systems, the options in the Software Restriction Policies node
provide organizations greater control in preventing potentially
dangerous applications from running. Software restriction policies are
designed to identify software and control its execution. In addition,
administrators can control who will be affected by the policies.";

Question No. 30 :

"What is the sum of the policies applied to a user or computer after
all filters, security group permissions, and inheritance settings, such
as Block Policy Inheritance and Enforce, have finished processing?";

Option No.- 1= "Effective Permissions";

Option No.- 2= "Resultant Set of Policy";

Option No.- 3= "Effective Set of Policy";

Option No.- 4= "Applied Policy";

Correct Option is= "B";

Explanation
of Answer= "Resultant Set of Policy (RSoP) is the sum of the policies
applied to a user or computer after all filters, security group
permissions, and inheritance settings, such as Block Policy Inheritance
and Enforce, have finished processing.";

Question No. 31 :

"Rather than simulating policy effects like the Group Policy Modeling
Wizard, what obtains RSoP information from the client computer to show
the actual effects that policies have on the client computer and user
environment?";

Option No.- 1= "Group Policy Simulator";

Option No.- 2= "Group Policy Planning";

Option No.- 3= "Group Policy Modeling";

Option No.- 4= "Group Policy Results";

Correct Option is= "D";

Explanation
of Answer= "The Group Policy Results feature in Group Policy Management
is equivalent to the Logging mode within the Resultant Set of Policy
MMC snap-in. Rather than simulating policy effects, such as the Group
Policy Modeling Wizard, Group Policy Results obtains RSoP information
from the client computer to show the actual effects that policies have
on the client computer and user environment.";

Question No. 32 :

"What refines the application of a GPO to include or exclude certain
users, groups, or computers based on the ACL that is applied to the
GPO?";

Option No.- 1= "Block Policy Inheritance";

Option No.- 2= "Policy Delegation";

Option No.- 3= "Group Based Filtering";

Option No.- 4= "Security Group Filtering";

Correct Option is= "D";

Explanation
of Answer= "The Security Group Filtering method uses the GPO’s Security
tab to determine user and group account access to the policy.";

Explanation
of Answer= "Offline defragmentation is a manual process that
defragments the Active Directory database in addition to reducing its
size. Performing an offline defragmentation is not considered to be a
regular maintenance task. You should only perform an offline
defragmentation if you need to recover a significant amount of disk
space.";

Question No. 34 :

"The Reliability and Performance Monitor uses categories called
performance __________ to organize the items that can be monitored.";

Option No.- 1= "objects";

Option No.- 2= "counters";

Option No.- 3= "items";

Option No.- 4= "classes";

Correct Option is= "A";

Explanation
of Answer= "The Reliability and Performance Monitor uses categories to
organize the items that can be monitored, which are referred to as
performance objects.";

Question No. 35 :

"What is the command-line component of the Windows Server Backup snap-in?";

Option No.- 1= "wbadm";

Option No.- 2= "wbadmin";

Option No.- 3= "backadm";

Option No.- 4= "ntbackup";

Correct Option is= "B";

Explanation
of Answer= "Windows Server 2008 allows several different restoration
methods depending on the goals for your restore. You can use wbadmin,
which is the command-line component of the Windows Server Backup
snap-in.";

Question No. 36 :

"Server Backup does not support the use of which type of backup media?";

Option No.- 1= "CD drives";

Option No.- 2= "DVD drives";

Option No.- 3= "hard drives";

Option No.- 4= "magnetic tape";

Correct Option is= "D";

Explanation
of Answer= "Windows Server Backup supports the use of CD and DVD drives
as backup destinations, but does not support magnetic tapes as backup
media. Additionally, you cannot perform backups to dynamic volumes.";

Question No. 37 :

"What is the name resolution mechanism that computers use for all
Internet communications and for private networks that use the Active
Directory domain services included with Microsoft Windows Server 2008,
Windows Server 2003, and Windows 2000 Server?";

Option No.- 1= "DNS";

Option No.- 2= "DHCP";

Option No.- 3= "NetBIOS";

Option No.- 4= "ADFS";

Correct Option is= "A";

Explanation
of Answer= "The Domain Name System (DNS) is the name resolution
mechanism computers use for all Internet communications and for private
networks that use the Active Directory domain services included with
Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000
Server. The names that you associate with the Internet, such as the
names of Internet servers in Uniform Resource Locators (URLs) and the
domain names in email addresses, are part of the DNS namespace and are
resolvable by DNS name servers.";

Question No. 38 :

"What type of zone contains the master copy of the zone database in
which administrators make all changes to the zone’s resource records?";

Option No.- 1= "secondary zone";

Option No.- 2= "stub zone";

Option No.- 3= "primary zone";

Option No.- 4= "forwarder zone";

Correct Option is= "C";

Explanation
of Answer= "A primary zone contains the master copy of the zone
database in which administrators make all changes to the zone’s resource
records.";

Question No. 39 :

"What are the highest-level DNS servers in the entire namespace?";

Option No.- 1= "top-level name server";

Option No.- 2= "root name server";

Option No.- 3= "authoritative name server";

Option No.- 4= "upstream name server";

Correct Option is= "B";

Explanation
of Answer= "At the top of the domain hierarchy are the root name
servers, which are the highest-level DNS servers in the entire
namespace. They maintain information about the top-level domains.";

Question No. 40 :

"In terms of AD FS, what organizations contain the user accounts that
are accessing the resources controlled by resource organizations,
similar to a trusted domain in a traditional Windows trust
relationship?";

Option No.- 1= "user organizations";

Option No.- 2= "account organizations";

Option No.- 3= "computer organizations";

Option No.- 4= "resource organizations";

Correct Option is= "B";

Explanation
of Answer= "Account organizations contain the user accounts that are
accessing the resources controlled by resource organizations, similar to
a trusted domain in a traditional Windows trust relationship.";

Question No. 41 :

"What role in ILM is to provide services for managing public key
certificates that can be used by any security system that relies on a
PKI for authentication or authorization?";

Option No.- 1= "Active Directory Users and Computers";

Option No.- 2= "Group Policy";

Option No.- 3= "Active Directory Certificate Services";

Option No.- 4= "Active Directory Domains and Trusts";

Correct Option is= "C";

Explanation
of Answer= "The new Active Directory Certificate Services (AD CS) role
in Windows Server 2008 is a component within Microsoft’s larger Identity
Lifecycle Management (ILM) strategy. The role of AD CS in ILM is to
provide services for managing public key certificates that can be used
by any security system that relies on a PKI for authentication or
authorization.";

Question No. 42 :

"What enables a user to manually create a certificate request file using the Certificates MMC snap-in?";

Option No.- 1= "PKI";

Option No.- 2= "Certificate Request Wizard";

Option No.- 3= "Autoenrollment Wizard";

Option No.- 4= "Enrollment ACL";

Correct Option is= "B";

Explanation
of Answer= "The Certificate Request Wizard enables a user to manually
create a certificate request file using the Certificates MMC snap-in.
This wizard creates a request file that can be used by the Certification
Authority MMC to generate a certificate based on the request.";

Question No. 43 :

"What is used to request certificates on behalf of a user, computer, or
service if self-enrollment is not practical or is otherwise an
undesirable solution for reasons of security or auditing?";

Option No.- 1= "enrollment agents";

Option No.- 2= "smart cards";

Option No.- 3= "Certificate Authority";

Option No.- 4= "access point";

Correct Option is= "A";

Explanation
of Answer= "Enrollment agents are used to request certificates on
behalf of a user, computer, or service if self-enrollment is not
practical or is otherwise an undesirable solution for reasons of
security, auditing, and so on. An enrollment agent typically consists of
a dedicated workstation that is used to install certificates onto smart
cards, thus preconfiguring a smart card for each person’s use.";